-
1
المؤلفون: Hammar, Kim, Stadler, Rolf, Prof.
المصدر: IEEE Transactions on Network and Service Management. 21(1):1158-1177
مصطلحات موضوعية: Games, Security, Emulation, Reinforcement learning, Observability, Logic gates, History, Cybersecurity, network security, automated security, intrusion response, optimal stopping, Dynkin games, game theory, Markov decision process, MDP, POMDP
وصف الملف: print
-
2Academic Journal
المؤلفون: Anastasiia Khlaponina, Salam Omar Alo, Abeer Salim Jamil, Mohammed Jabbar Hussein, Mohammed K.H. Al-Dulaimi, Sarmad Waleed Taha
المصدر: Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 36, Iss 1, Pp 566-577 (2024)
مصطلحات موضوعية: cybersecurity, generative adversarial networks (gans), threat detection, machine learning, automated security, cyber threats, deep learning, anomaly detection, artificial intelligence (ai), network security., Telecommunication, TK5101-6720
وصف الملف: electronic resource
-
3Academic Journal
المؤلفون: Yong-Joon Lee
المصدر: Applied Sciences, Vol 14, Iss 24, p 11836 (2024)
مصطلحات موضوعية: scenario-based evaluation system, security accident prediction, MITRE ATT&CK framework, cyber threat management, automated security audits, Technology, Engineering (General). Civil engineering (General), TA1-2040, Biology (General), QH301-705.5, Physics, QC1-999, Chemistry, QD1-999
وصف الملف: electronic resource
-
4Academic Journal
المؤلفون: Rishitha, Kokku
المصدر: International Journal of Current Science Research and Review, 07(11), 8140-8144, (2024-11-01)
مصطلحات موضوعية: AI in Cybersecurity, AI/ML Tools for Security Testing., artificial intelligence (AI), Automated Security Testing, Continuous Deployment (CD), Continuous Integration (CI), DevOps, DevSecOps, Machine Learning (ML), Security in DevOps, Shift-Left Security, Vulnerability Detection
Relation: https://doi.org/10.5281/zenodo.14027397; https://doi.org/10.5281/zenodo.14027398; oai:zenodo.org:14027398
-
5Academic Journal
المؤلفون: Minna, Francesco, Blaise, Agathe, Massacci, Fabio, Tuma, Katja
المصدر: Minna , F , Blaise , A , Massacci , F & Tuma , K 2024 , Automated Security Repair for Helm Charts . in ICSE-Companion '24 : Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings . Proceedings - International Conference on Software Engineering , IEEE Computer Society , pp. 412-413 , 46th International Conference on Software Engineering: Companion, ICSE-Companion 2024 , Lisbon , Portugal , 14/04/24 . https://doi.org/10.1145/3639478.3643534
مصطلحات موضوعية: Automated Security Repair, Helm Charts, Kubernetes, Misconfigurations
وصف الملف: application/pdf
Relation: urn:ISBN:9798400705021
الاتاحة: https://research.vu.nl/en/publications/c613f01f-c6de-4fcd-9d03-d538f431aa62
https://doi.org/10.1145/3639478.3643534
https://hdl.handle.net/1871.1/c613f01f-c6de-4fcd-9d03-d538f431aa62
https://research.vu.nl/ws/files/361664415/Automated_Security_Repair_for_Helm_Charts.pdf
http://www.scopus.com/inward/record.url?scp=85194877006&partnerID=8YFLogxK
http://www.scopus.com/inward/citedby.url?scp=85194877006&partnerID=8YFLogxK -
6Academic Journal
المساهمون: Casola, Valentina, De Benedictis, Alessandra, Mazzocca, Carlo, Orbinato, Vittorio
وصف الملف: ELETTRONICO
Relation: volume:137; firstpage:1; lastpage:16; numberofpages:16; journal:COMPUTERS & SECURITY; https://hdl.handle.net/11585/961880; info:eu-repo/semantics/altIdentifier/scopus/2-s2.0-85179122783; https://www.sciencedirect.com/science/article/pii/S0167404823005497
-
7Academic Journal
المؤلفون: Vladimir L. Evseev, Vitaliy G. Ivanenko
المصدر: Безопасность информационных технологий, Vol 28, Iss 1, Pp 19-28 (2021)
مصطلحات موضوعية: automated security system, structural diagram, objects of increased security, decomposition into subsystems, perimeter and local protection zones, efficiency indicator, reliability indicator, operational stability indicator, life cycle cost indicator., Information technology, T58.5-58.64, Information theory, Q350-390
وصف الملف: electronic resource
-
8Academic Journal
المؤلفون: Bella Gertrude B. Alpasan
المصدر: International Journal of Multidisciplinary Research and Analysis, 05(01), 63-66, (2022-01-11)
مصطلحات موضوعية: SMS, system, automated security light motion, room custodian
Relation: oai:zenodo.org:5836887
-
9
المؤلفون: Wang, Xiaoxuan, Stadler, Rolf, Prof.
المصدر: Proceedings of IEEE/IFIP Network Operations and Management Symposium 2024, NOMS 2024.
مصطلحات موضوعية: automated security, forensics, Hidden Markov Model, intrusion detection, Long Short-Term Memory, SNORT
وصف الملف: print
-
10Academic Journal
المؤلفون: Rohit Rastogi, Puru Jain, Rishabh Jain
المصدر: Journal of VLSI Design and Signal Processing, 5(2), 28-36, (2019-05-15)
مصطلحات موضوعية: Artificial Intelligence, Automated Security Systems, Big Data Analysis, Home automation, IoT, Smart Automation
Relation: https://zenodo.org/communities/mat-journals; https://doi.org/10.5281/zenodo.2836018; https://doi.org/10.5281/zenodo.2836019; oai:zenodo.org:2836019
-
11Academic Journal
المؤلفون: Rohit Rastogi, Puru Jain, Rishabh Jain
المصدر: International Journal of VLSI Design, Microelectronics and Embedded System, 4(1), 59- 69, (2019-04-30)
مصطلحات موضوعية: Big Data Analysis, IOT, Artificial intelligence, Home automation, Smart automation, automated security systems
Relation: https://zenodo.org/communities/mantechpublications; https://doi.org/10.5281/zenodo.2654499; https://doi.org/10.5281/zenodo.2654500; oai:zenodo.org:2654500
-
12
-
13
المؤلفون: Σολωμίδου, Κυριακή
المساهمون: Solomidou, Kyriaki
مصطلحات موضوعية: Κακόβουλος χρήστης, Ευάλωτα σημεία, Κυβερνοεπιθέσεις, Ασφάλεια και ιδιωτικότητα, Αυτοματοποιημένο σύστημα ελέγχου, Ανίχνευση απειλών ασφάλειας, Malicious user, Vulnerabilities, Cyber attacks, Security and privacy, Automated security scanner
وصف الملف: application/pdf
Relation: https://hdl.handle.net/10889/27551
الاتاحة: https://hdl.handle.net/10889/27551
-
14Academic Journal
المؤلفون: Biskup, Joachim, Hämmerli, Bernhard, Meier, Michael, Schmerl, Sebastian, Tölle, Jens, Vogel, Michael
المساهمون: Joachim Biskup and Bernhard Hämmerli and Michael Meier and Sebastian Schmerl and Jens Tölle and Michael Vogel
مصطلحات موضوعية: Intrusion detection and prevention, attack response and countermeasures, reactive security, automated security, survivability and self-protection, ma network monitoring, flow analysis, denial of service detection and response, event correlation
وصف الملف: application/pdf
Relation: Is Part Of Dagstuhl Seminar Proceedings, Volume 8102, Perspectives Workshop: Network Attack Detection and Defense (2008); https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.08102.2
-
15Academic Journal
المؤلفون: Braun, Lothar, Dressler, Falko, Holz, Thorsten, Kirda, Engin, Kohlrausch, Jan, Kruegel, Christopher, Limmer, Tobias, Rieck, Konrad, Sterbenz, James
المساهمون: Lothar Braun and Falko Dressler and Thorsten Holz and Engin Kirda and Jan Kohlrausch and Christopher Kruegel and Tobias Limmer and Konrad Rieck and James Sterbenz
مصطلحات موضوعية: Intrusion detection and prevention, attack response and countermeasures, reactive security, automated security, survivability and self-protection, ma network monitoring, flow analysis, denial of service detection and response, event correlation
وصف الملف: application/pdf
Relation: Is Part Of Dagstuhl Seminar Proceedings, Volume 8102, Perspectives Workshop: Network Attack Detection and Defense (2008); https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.08102.6
-
16Academic Journal
المؤلفون: Braun, Lothar, Braun, Thorsten, Carle, Georg, Dressler, Falko, Feldmann, Anja, Haage, Dirk, Limmer, Tobias, Zseby, Tanja
المساهمون: Lothar Braun and Thorsten Braun and Georg Carle and Falko Dressler and Anja Feldmann and Dirk Haage and Tobias Limmer and Tanja Zseby
مصطلحات موضوعية: Intrusion detection and prevention, attack response and countermeasures, reactive security, automated security, survivability and self-protection, ma network monitoring, flow analysis, denial of service detection and response, event correlation
وصف الملف: application/pdf
Relation: Is Part Of Dagstuhl Seminar Proceedings, Volume 8102, Perspectives Workshop: Network Attack Detection and Defense (2008); https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.08102.5
-
17Academic Journal
المؤلفون: Carle, Georg, Dressler, Falko, Kemmerer, Richard A., Koenig, Hartmut, Kruegel, Christopher
المساهمون: Georg Carle and Falko Dressler and Richard A. Kemmerer and Hartmut Koenig and Christopher Kruegel
مصطلحات موضوعية: Intrusion detection and prevention, attack response and countermeasures, reactive security, automated security, survivability and self-protection, ma network monitoring, flow analysis, denial of service detection and response, event correlation
وصف الملف: application/pdf
Relation: Is Part Of Dagstuhl Seminar Proceedings, Volume 8102, Perspectives Workshop: Network Attack Detection and Defense (2008); https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.08102.1
-
18Academic Journal
المؤلفون: Kemmerer, Richard A., Bueschkes, Roland, Fessi, Ali, Koenig, Hartmut, Herrmann, Peter, Wolthusen, Stephen, Jahnke, Marko, Debar, Hervé, Holz, Ralph, Zseby, Tanja, Haage, Dirk
المساهمون: Richard A. Kemmerer and Roland Bueschkes and Ali Fessi and Hartmut Koenig and Peter Herrmann and Stephen Wolthusen and Marko Jahnke and Hervé Debar and Ralph Holz and Tanja Zseby and Dirk Haage
مصطلحات موضوعية: Intrusion detection and prevention, attack response and countermeasures, reactive security, automated security, survivability and self-protection, ma network monitoring, flow analysis, denial of service detection and response, event correlation
وصف الملف: application/pdf
Relation: Is Part Of Dagstuhl Seminar Proceedings, Volume 8102, Perspectives Workshop: Network Attack Detection and Defense (2008); https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.08102.3
-
19Academic Journal
المؤلفون: Daciér, Marc, Flegel, Ulrich, Holz, Ralph, Luttenberger, Norbert
المساهمون: Marc Daciér and Ulrich Flegel and Ralph Holz and Norbert Luttenberger
مصطلحات موضوعية: Intrusion detection and prevention, attack response and countermeasures, reactive security, automated security, survivability and self-protection, ma network monitoring, flow analysis, denial of service detection and response, event correlation
وصف الملف: application/pdf
Relation: Is Part Of Dagstuhl Seminar Proceedings, Volume 8102, Perspectives Workshop: Network Attack Detection and Defense (2008); https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.08102.7
-
20Academic Journal
المؤلفون: Daciér, Marc, Debar, Hervé, Holz, Thorsten, Kirda, Engin, Kohlrausch, Jan, Kruegel, Christopher, Rieck, Konrad, Sterbenz, James
المساهمون: Marc Daciér and Hervé Debar and Thorsten Holz and Engin Kirda and Jan Kohlrausch and Christopher Kruegel and Konrad Rieck and James Sterbenz
مصطلحات موضوعية: Intrusion detection and prevention, attack response and countermeasures, reactive security, automated security, survivability and self-protection, ma network monitoring, flow analysis, denial of service detection and response, event correlation
وصف الملف: application/pdf
Relation: Is Part Of Dagstuhl Seminar Proceedings, Volume 8102, Perspectives Workshop: Network Attack Detection and Defense (2008); https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.08102.4